![7f6641992ecb0a5d4baac6d7cbfc043e.png](0bd831f141674bd788f329b42e9611b6.png)
![87ef2ae30b4c94d89cdeb0a96c386c3e.png](ba63c099b7954418a13475caf0ffb550.png)
See GI Joe? CGI?
`jh2i.com:50008/cgi-bin/`
![78919976be46b7ba61710ec01d2faa9d.png](270bf9771572434b8626a3c63cd5b6ed.png)
Doing some enumeration lead me to:
`jh2i.com:50008/?-s`
Which allows grabbing of the source code in older versions of PHP
![35f5d7abf247b13e228469b7eb9515fa.png](5078b21618214fbb8a59cc641d1ca500.png)
CVE-2012-1823
[https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1823)
There's a metasploit module to speed up this process
![5693d9c822eaf82d698d05e656f80b9e.png](c9c2025f150c43ffa3b4239ac9f5d985.png)
![e1606342f2d9910f062a60da0fafde9a.png](61c1e11da7d04a498a0e9b2508337547.png)
---
Back to [[_WebSite Publish/CTF/CTF Index|CTF Index]]
Tags: #ctf #php #cgi #web
Related: